Please wait, authorizing ...

Don't have an account? Register here today.


Cyberattacks and hacking to LED screens

Visual displays and LED screens are exposed to possible hacks, or rather, the computers that control the screens are; not in exchange for money, but it can make us have a bad drink with the temporary modification of unwanted content.

Adrian Morel

It would seem that cyberattacks or the intrusion of hackers into computer systems is the new criminal "modus operandi" of modern times.

The modalities are the most varied, some request money in exchange for the release of the captured data or blocks, others make covert bank transfers, there is also the manipulation of voters and finally, we see the intrusion in line networks or WiFi modifying contents in visual displays.

- Publicidad -

The agents or "viruses" perpetrators of such a criminal act, have different forms and names, among them we have the "pishings", the "Trojans", the "ramsonwares", "PETYA", etc. All of them have the function of entering computer devices and modifying the operational programming, leaving it under the absolute control of the intruder agent.

In December 2016, one of the most notorious scandals was the presidential election of the United States of America, where in the dispute between candidates Donald Trump and Hillary Clinton, there was talk of attacks by Russian programmers within the electoral voting system, with the intention of modifying votes.

In May 2017, a ramsonware virus called "wannacry" affected more than 200,000 computers in 150 countries. These viruses are a variant of the "PETYA" and serve three objectives. First: Infect files. Second: It encrypts them. Third: Blocks your access. This attack targeted the popular Ukrainian operating software "MeDoc" by taking advantage of its updates.

In June of this same year, companies from Ukraine and Russia, such as the oil company Rosneft, the Danish maritime transporter Maersk, the British advertising group WPP, also suffered similar attacks where hackers requested a sum of US $ 300 in bitcoin for the release of the data.

Nowadays hackers have access to any type of system, not only from companies but also in networks belonging to governments with maximum security systems.

What is ramsonware?
It is a programming code that restricts the access of some files by encrypting them, asking for a ransom in exchange for release. It is transmitted as a worm or a Trojan. It affects corporate and personal computers under the variant called "Locky" which is a Trojan virus that is received through an email. Other variants of ramoneare are the cryptowall4, PadCrypt and Fakben.

These viruses seem to attack more frequently the Windows operating systems, of automatic update like the Window 10 or the Window 8, 8.1 of manual update.

- Publicidad -

Hacking LED screens
There were countless intrusions to LED screens or visual displays in India (2005), Bulgaria (2007), Germany (2007), Iran (2007), Los Angeles-California (2008), UK (2008), Croatia (2208), MIT University (2009), Tucson-Arizona (2009), New York (2009), Hampshire-UK (2009), Moscow (2010), Parliament of Indonesia (2010), Argentina (2017), but in all these attacks they have not asked for money in return, rather, they have modified the content for propaganda purposes.

Hacking any visual display is possible, for this we must identify the "frequency and format" of the streaming signal.

Today we have electronic devices that can capture packets of data from a network, retrieve them and analyze the type of "coding". These devices can open keys or passwords of wireless systems of 802.11 WEP systems, WPA-PSK of Windows, Linux, OSx, BSD and Solaris platforms.

Visual displays and LED screens are exposed to possible hacks, or rather, the computers that control the screens are. The screens for events that are controlled by "stand alone" or "console" systems will not have an intrusion problem, but those visual systems networked for public roads and that are fed via WiFi or Microwave, run the risk of being intercepted, not in exchange for money, but it can make us have a bad drink with the temporary modification of unwanted content.

*Adrian Morel is a consultant with 20 years of experience in Silicon Valley, California and can be contacted at: [email protected]

Richard Santa, RAVT
Author: Richard Santa, RAVT
Periodista de la Universidad de Antioquia (2010), con experiencia en temas sobre tecnología y economía. Editor de las revistas TVyVideo+Radio y AVI Latinoamérica. Coordinador académico de TecnoTelevisión&Radio.

No thoughts on “Cyberattacks and hacking to LED screens”

• If you're already registered, please log in first. Your email will not be published.

Leave your comment

In reply to Some User
Suscribase Gratis


Sesión de Bienvenida presentada por Richard Santa editor de AVI Latinoamérica y Verónica Marín Project manager de AVI Latinoamérica y TecnoMultimedia Latinoamérica (TMI).

Sesión 1 - Panel: Recuperación del mercado de eventos en vivo en Latam

Oswaldo Rueda, Gerente General - Yamaki Juan Portugal, Gerente Técnico - T&S Group Walter Arias, CEO - VIP.MX

Sesión 2: La nueva realidad del audio profesional en Latinoamérica

La pandemia del COVID19 trajo consigo muchos cambios, pero ¿estábamos preparados para este nuevo repunte del mercado que vemos actualmente? Producción, generación de demanda, distribución, marketing todos unidos hacia un mismo objetivo. La satisfacción del cliente cuando más nos necesita. Javier Ocampo, Gerente Senior de Desarrollo de Mercado, Shure América Latina

Sesión 3: Dante para entornos de Audio en Vivo

Miguel García, Technical Training Manager, Latin America - Audinate

Sesión 4: Programas de predicción acústica

A lo largo de este webinar estudiaremos el proceso de diseño de sistemas de altavoces y los beneficios de utilizar herramientas como programas de predicción. Aprenderemos las principales características de los programas y a interpretar los datos que estos arrojan. Michael “Mija” Krieg Schreiber, Ing. de ventas Pro Audio - Electro-Voice
Load more...

Ultimo Info-Boletin